Sunday, 30 August 2020

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

Related links
  1. Hack Tools For Mac
  2. Pentest Tools Tcp Port Scanner
  3. Android Hack Tools Github
  4. Pentest Tools For Ubuntu
  5. Pentest Tools Linux
  6. Android Hack Tools Github
  7. Hacker Tools 2020
  8. Hacker Tools Windows
  9. Hacking Tools And Software
  10. Hacker
  11. Nsa Hack Tools
  12. Best Hacking Tools 2019
  13. Hacking App
  14. Hacker Tools Github
  15. Hackrf Tools
  16. Hacking Tools
  17. Pentest Tools Alternative
  18. Hacking Apps
  19. Nsa Hack Tools Download
  20. Pentest Tools Alternative
  21. Hacker Tools For Mac
  22. Hacking Tools 2019
  23. Easy Hack Tools
  24. Hacker Tools For Ios
  25. Hack Tools For Pc
  26. Pentest Tools Port Scanner
  27. Hacking Tools For Windows 7
  28. Hacking Tools Github
  29. Hacking Tools Software
  30. Hacker Tools For Ios
  31. Pentest Tools Framework
  32. Pentest Tools Open Source
  33. Hacking Tools For Pc
  34. Pentest Tools Android
  35. Hack Tools Mac
  36. Hacker Tools 2020
  37. Hack Tools For Games
  38. Hacker Tools For Mac
  39. Hack Tools
  40. Free Pentest Tools For Windows
  41. Hacking Tools For Games
  42. Hacking Tools Online
  43. Hacking Tools Online
  44. Pentest Tools Linux
  45. Hack Tools For Games
  46. Hack Tools Pc
  47. How To Make Hacking Tools
  48. Blackhat Hacker Tools
  49. Pentest Tools For Mac
  50. Best Pentesting Tools 2018
  51. Hacking Tools For Beginners
  52. Best Hacking Tools 2019
  53. Hacking Tools Windows
  54. Hacker Tools Free Download
  55. Tools 4 Hack
  56. Pentest Tools Website Vulnerability
  57. Pentest Tools Port Scanner
  58. Hacker Tools Hardware
  59. Pentest Automation Tools
  60. Hacking Tools Windows 10
  61. Pentest Tools Github
  62. Hacking Tools Usb
  63. Pentest Tools Review
  64. Hacking Tools Software
  65. Hacking Tools Pc
  66. Hack Rom Tools
  67. Hacker Tools Free Download
  68. Hacking Tools Free Download
  69. Bluetooth Hacking Tools Kali
  70. Hack Tools Mac
  71. Hacking Tools Pc
  72. Hacker Tools For Mac
  73. Tools 4 Hack
  74. Hacking Tools For Mac
  75. Hacking Tools Online
  76. Hacker Tools For Windows
  77. Hacking Tools 2019
  78. Hackrf Tools
  79. Hacker Tools For Pc
  80. Hack Tools 2019
  81. Hacking Tools Github
  82. New Hack Tools
  83. Hacker Tools For Windows
  84. Hack Tools Mac
  85. Game Hacking
  86. Hacking Tools Hardware
  87. Hack App
  88. Hacker Tools
  89. Game Hacking
  90. Nsa Hack Tools Download
  91. Hack App
  92. Pentest Tools Website
  93. Pentest Tools Tcp Port Scanner
  94. Physical Pentest Tools
  95. Hacker Tools Online
  96. Hack Website Online Tool
  97. Pentest Tools Find Subdomains
  98. Hacking Tools Usb
  99. Hacker Tools List
  100. Termux Hacking Tools 2019
  101. What Are Hacking Tools
  102. Hacker Techniques Tools And Incident Handling
  103. Pentest Tools List

0 comments:

Post a Comment